acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

PD Points and Teacher Licensing: Chickens and Eggs
From Computer Science Teachers Association

PD Points and Teacher Licensing: Chickens and Eggs

I am nearing the end of my five year cycle for recertification, so I am reviewing what professional development activities I have participated in to see what qualifies...

iPad Addiction
From The Eponymous Pickle

iPad Addiction

In Baseline Mag:  Some thoughts and statistics about how people are getting addicted to the tablet format. Retailers and marketers should notice this.

Hacking the Papal Election
From Schneier on Security

Hacking the Papal Election

As the College of Cardinals prepares to elect a new pope, security people like me wonder about the process. How does it work, and just how hard would it be to hack...

How to Create a Mind
From The Eponymous Pickle

How to Create a Mind

A piece on Ray Kurzweil's  (now at Google)  latest book: How to Create a Mind: the Secret of Human Thought Revealed.  Always fascinating, sometimes over the top...

On the Cost of Suspicion
From The Eponymous Pickle

On the Cost of Suspicion

An interesting HBR case study of the cost of suspicion in the enterprise.  Refreshingly different piece.  Also hints at how this can go beyond just the usual personnel...

Obama Endorses Programming Classes in High School
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Obama Endorses Programming Classes in High School

On one hand this is great. The President of the United States promotes computer science education. On the other hand he talks about it primarily as a vocational...

All Those Companies that Can't Afford Dedicated Security
From Schneier on Security

All Those Companies that Can't Afford Dedicated Security

This is interesting: In the security practice, we have our own version of no-man's land, and that's midsize companies. Wendy Nather refers to these folks as being...

The curious cult of the connected thermostat
From Putting People First

The curious cult of the connected thermostat

Nick Hunn, CTO at Onzo, a “smarter than normal” Smart Energy start-up, criticizes the service model of the Nest thermostat: “A basic programmable thermostat in...

Python Issue Slithers Away?
From Wild WebMink

Python Issue Slithers Away?

Looks like Python Hosting is no more. I’ve seen nothing official, but I note from veber.co.uk that the new name for their cloud hosting is Veber Cloud.  My story...

Lean and user experience, again
From Putting People First

Lean and user experience, again

When anthropologist Natalie Hanson was asked last year to contribute to a new book called The Handbook of Business Anthropology, edited by Rita Denny and Patty...

How will big data change design research?
From Putting People First

How will big data change design research?

Will design researchers (and our models and explanations) be replaced by data tables and “experience actuaries” that tell us what to build, for whom, and what it...

Neural Networks Retooling the Android
From The Eponymous Pickle

Neural Networks Retooling the Android

We used so-called artificial neural nets (ANN) in the enterprise over a decade ago for specific kinds of focused analysis of consumer data.  Inspired by the brain's...

Evidence Tablets are Eroding PC Market
From The Eponymous Pickle

Evidence Tablets are Eroding PC Market

In GigaOM:    Even a cursory observation in any airport waiting room will demonstrate this. "  Naysayers may continue to ignore the trend, but tablets aren’t toys...

White House Releases Strategy to Tackle Trade Secret Theft
From U.S. Public Policy Committee of the ACM

White House Releases Strategy to Tackle Trade Secret Theft

A new White House strategy paper released on Wednesday outlines a five-pronged approach for protecting trade secrets of U.S. companies against a growing threat...

Augmented Reality Chipset
From The Eponymous Pickle

Augmented Reality Chipset

Metaio announces bringing this idea to market today.   A good idea for prototyping applications of AR.  I also see specialized applications of augmented reality...

Crime Prediction with Selective Data
From The Eponymous Pickle

Crime Prediction with Selective Data

In GigaOm:  Overview of a recent paper on crime prediction using Big Data.    Nicely done, good example that whose principles can be reapplied in other domains....

From Computational Complexity

Interruptions

I got a new toy this week, the Pebble watch which I got early because I pre-ordered donated to their Kickstarter campaign. It's a little buggy and the promised...

Peer review without journals or conferences
From Daniel Lemire's Blog

Peer review without journals or conferences

Almost all scientists ask their peers to review their work outside of the formal process offered by journals and conferences. Young scientists are routinely told...

Testimony on “Applications for Information Technology Research & Development” to House Science Committee Subcommittee on Research
From The Computing Community Consortium Blog

Testimony on “Applications for Information Technology Research & Development” to House Science Committee Subcommittee on Research

On February 14, Kelly Gaither (Texas Advanced Computing Center), Kathryn McKinley (Microsoft Research), and Ed Lazowska (University of Washington and Computing...

More on Chinese Cyberattacks
From Schneier on Security

More on Chinese Cyberattacks

Wow, is this a crazy media frenzy. We should know better. These attacks happen all the time, and just because the media is reporting about them with greater frequency...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account